› Threats to privacy / Identity theft Facebook scams also tap into interest in the news, holiday activities and other topical events to get you to innocently reveal your personal information. Facebook posts such as “create a Royal Wedding guest name” and "In honor of Mother’s Day" seem innocuous enough, until you realize that information such as your children’s names and birthdates, pet’s name and street name now reside permanently on the Internet. Since this information is often used for passwords or password challenge questions, it can lead to identity theft.
“Clickjacking" or "likejacking," also known as "UI redressing” › Tricks web users into revealing confidential information or takes control of their computer when they click on seemingly innocuous webpages. Clickjacking takes the form of embedded code or script that can execute without the user's knowledge. One disguise is a button that appears to perform another function. Clicking the button sends out the attack to your contacts through status updates, which propagates the scam
“Facebook Removing Option To Be Unsearchable By Name, Highlighting Lack Of Universal Privacy Controls” (http://techcrunch.com/2013/10/10/faceb ook-search-privacy/)http://techcrunch.com/2013/10/10/faceb ook-search-privacy/
Facebook’s security features: › In theory, new Facebook security features provide protection against scams and spam but unfortunately they’re mainly ineffectual. Self-XSS, clickjacking and survey scams essentially did not exist just a few years ago, but they now appear on Facebook and other social networks on a daily basis
› Check to see that you're logging in from a legitimate Facebook page with the facebook.com domain › Remote logout › Common sense › Use an up-to-date browser that features an anti-phishing black list
Youtube › Availability of many videos and the incredible volumes of traffic the site receives, it shouldn’t come as surprise that cybercriminals are looking to reap some benefit Links in the video description to full video -> leads to online survey rabbit hole
› Google account (Gmail, Youtube, Drive etc.) One account linked to many services -> One password to get access to all of the services Article: ”Android one-click Google authentication method puts users, businesses at risk” (http://www.computerworld.com/s/article/9241 355/Android_one_click_Google_authentication_ method_puts_users_businesses_at_risk)http://www.computerworld.com/s/article/9241 355/Android_one_click_Google_authentication_ method_puts_users_businesses_at_risk
Web 2.0 describes web sites that use technology beyond the static pages of earlier web sites Web 2.0 is the popular term for advanced Internet technology and applications including blogs, wikis, RSS and social bookmarking. The two major components of Web 2.0 are the technological advances enabled by Ajax and other new applications such as RSS and Eclipse and the user empowerment that they support.
› Insufficient Authentication Controls In many Web 2.0 applications, content is trusted in the hands of many users, not just a select number of authorized personnel. That means there's a greater chance that a less-experienced user will make a change that will negatively affect the overall system. › Cross Site Scripting In a stored cross site scripting (XSS) vulnerability, malicious input sent by an attacker is stored in the system then displayed to other users. At risk are blogs, social networks, and wikis › Phishing Although phishing isn't just a risk associated with Web 2.0 technologies by any means, the multitude of dissimilar client software in use makes it harder for consumers to distinguish between the genuine and the fake web sites
Flash › A major advantage of using the Flash Player for Web 2.0 applications is consistent development across operating systems and browsers and a lot less overhead programming around differences and needing to debug and test on every configuration. › The Flash Player has more reach than any browser or operating system, and is being distributed faster than any other technology › Transformation of Flash from purely an animation engine to a runtime for rich media and rich internet applications has been happening for several years now
› The new Flash Player 9 has even stronger enterprise data connectivity including client support for Flex Enterprise Services which enables use of message queues, integration with JMS, remote procedure calls, and data synchronization. This enables not only simple applications like photo viewers, but also sophisticated business applications.
Your consent to our cookies if you continue to use this website.